Multiple Choice
A ____ is created after an attack and usually hides itself within the OS tools, so it's almost impossible to detect.
A) toolbox
B) rootkit
C) shell
D) macro virus
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q16: Software keyloggers behave like _ and are
Q17: Antivirus software compares _ of known viruses
Q19: Describe an example of a macro virus.
Q20: _ is concerned with the security of
Q22: MATCHING<br>Match each term with the correct statement
Q23: A(n) _ is a virus encoded as
Q24: Which of the following provides the most
Q25: _ enables an attacker to join a
Q26: In a _ attack, a programmer finds
Q40: What is the difference between spyware and